Search criteria
1 vulnerability found for s9922l by riconmobile
VAR-202202-1183
Vulnerability from variot - Updated: 2023-12-18 13:17The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user. Ricon Mobile Provided by the company Industrial Cellular Router Is a mobile network router. Powerful 64-bit Processor and integrated real-timeoperating system specially developed by Ricon Mobile. S9922XL iswidely used in many areas such as intelligent transportation, scada,POS, industrial automation, telemetry, finance, environmental protection.The router suffers from an authenticated OS command injectionvulnerability. Also vulnerable to Heartbleed.Tested on: GNU/Linux 2.6.36 (mips)WEB-ROUTER
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202202-1183",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9922l",
"scope": "eq",
"trust": 1.0,
"vendor": "riconmobile",
"version": "16.10.3"
},
{
"model": "s9922xl",
"scope": "eq",
"trust": 1.0,
"vendor": "riconmobile",
"version": "16.10.3"
},
{
"model": "s9922l",
"scope": null,
"trust": 0.8,
"vendor": "ricon mobile",
"version": null
},
{
"model": "s9922xl",
"scope": "eq",
"trust": 0.8,
"vendor": "ricon mobile",
"version": "version 16.10.3"
},
{
"model": "mobile ricon industrial cellular router s9922xl",
"scope": "eq",
"trust": 0.6,
"vendor": "ricon",
"version": "16.10.3"
},
{
"model": "mobile ricon industrial cellular router s9922l",
"scope": "eq",
"trust": 0.6,
"vendor": "ricon",
"version": "16.10.3"
},
{
"model": "industrial cellular router s",
"scope": "eq",
"trust": 0.1,
"vendor": "ricon mobile",
"version": "model: s9922xl and s9922l"
},
{
"model": "industrial cellular router s",
"scope": "eq",
"trust": 0.1,
"vendor": "ricon mobile",
"version": "firmware: 16.10.3"
}
],
"sources": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:riconmobile:s9922l_firmware:16.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:riconmobile:s9922l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:riconmobile:s9922xl_firmware:16.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:riconmobile:s9922xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-0365"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Gjoko Krstic of Zero Science Lab reported this vulnerability to CISA.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
],
"trust": 0.6
},
"cve": "CVE-2022-0365",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-11495",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2022-0365",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ics-cert@hq.dhs.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 9.1,
"baseSeverity": "Critical",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2022-001298",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-0365",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2022-0365",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "OTHER",
"id": "JVNDB-2022-001298",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2022-11495",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202202-093",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "ZSL",
"id": "ZSL-2021-5653",
"trust": 0.1,
"value": "(4/5)"
},
{
"author": "VULMON",
"id": "CVE-2022-0365",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user. Ricon Mobile Provided by the company Industrial Cellular Router Is a mobile network router. Powerful 64-bit Processor and integrated real-timeoperating system specially developed by Ricon Mobile. S9922XL iswidely used in many areas such as intelligent transportation, scada,POS, industrial automation, telemetry, finance, environmental protection.The router suffers from an authenticated OS command injectionvulnerability. Also vulnerable to Heartbleed.Tested on: GNU/Linux 2.6.36 (mips)WEB-ROUTER",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "VULMON",
"id": "CVE-2022-0365"
}
],
"trust": 2.34
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.zeroscience.mk/codes/ricon_cmdinj.txt",
"trust": 0.1,
"type": "poc"
}
],
"sources": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "ICS CERT",
"id": "ICSA-22-032-01",
"trust": 3.2
},
{
"db": "NVD",
"id": "CVE-2022-0365",
"trust": 3.2
},
{
"db": "JVN",
"id": "JVNVU93682644",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-11495",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022020407",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "163390",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "50096",
"trust": 0.1
},
{
"db": "CXSECURITY",
"id": "WLB-2021070038",
"trust": 0.1
},
{
"db": "ZSL",
"id": "ZSL-2021-5653",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-0365",
"trust": 0.1
}
],
"sources": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"id": "VAR-202202-1183",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-11495"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-11495"
}
]
},
"last_update_date": "2023-12-18T13:17:31.889000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "CONTACT",
"trust": 0.8,
"url": "https://riconmobile.com/contact"
},
{
"title": "Patch for Ricon Mobile Ricon Industrial Cellular Router S9922L and S9922XL OS Command Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/320691"
},
{
"title": "Ricon Industrial Cellular Router S9922L Fixes for operating system command injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180564"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.0
},
{
"problemtype": "OS Command injection (CWE-78) [ Other ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01"
},
{
"trust": 0.9,
"url": "https://jvn.jp/vu/jvnvu93682644/"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-0365"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022020407"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-032-01"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/50096"
},
{
"trust": 0.1,
"url": "https://packetstormsecurity.com/files/163390/"
},
{
"trust": 0.1,
"url": "https://cxsecurity.com/issue/wlb-2021070038"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/204901"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2022-0365"
},
{
"trust": 0.1,
"url": "https://riconmobile.com/blog/new-firmware-release-notification"
},
{
"trust": 0.1,
"url": "https://www.isssource.com/hole-in-ricon-mobile-industrial-cellular-router/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/78.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-07-04T00:00:00",
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"date": "2022-02-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"date": "2022-02-04T00:00:00",
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"date": "2022-02-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"date": "2022-02-04T23:15:12.563000",
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"date": "2022-02-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-09-08T00:00:00",
"db": "ZSL",
"id": "ZSL-2021-5653"
},
{
"date": "2022-02-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-11495"
},
{
"date": "2022-02-09T00:00:00",
"db": "VULMON",
"id": "CVE-2022-0365"
},
{
"date": "2022-02-03T06:22:00",
"db": "JVNDB",
"id": "JVNDB-2022-001298"
},
{
"date": "2022-02-09T03:27:36.073000",
"db": "NVD",
"id": "CVE-2022-0365"
},
{
"date": "2022-03-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ricon\u00a0Mobile\u00a0 Made \u00a0Industrial\u00a0Cellular\u00a0Router\u00a0 In \u00a0OS\u00a0 Command injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-001298"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202202-093"
}
],
"trust": 0.6
}
}